Record summary
A quick snapshot of what this page covers.
Tactic overview
What attackers may be trying to achieve.
The adversary is trying to move through your AI environment.
Lateral Movement consists of techniques that adversaries may use to gain access to and control other systems or components in the environment. Adversaries may pivot towards AI Ops infrastructure such as model registries, experiment trackers, vector databases, notebooks, or training pipelines. As the adversary moves through the environment, they may discover means of accessing additional AI-related tools, services, or applications. AI agents may also be a valuable target as they commonly have more permissions than standard user accounts on the system.
- ATLAS ID
- AML.TA0015
- ATT&CK external ID
- TA0008
- Technique count
- 2
Technique coverage
Attack methods grouped under this attacker goal.
AML.T0052 - Phishing
AML.T0091 - Use Alternate Authentication Material
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.